Solved

How to prevent sabotage attacks

Posted on 2008-06-09
4
1,031 Views
Last Modified: 2013-12-09
Dear Experts ,  

  I am working on a sabotage attack prevention project . Would request you people's expert opinion on preventing the following types of  attacks :

 1 ) excessive queries to server applications  ( other than image verification , is there any other prevention strategies ?)

 2 ) using specific keywords to spam google results

 3 ) Submitting the site to hundereds of porn directories regularly

4 ) placing URL on "bad neighborhood" sites

5 ) Rendering sites "buried" in search results

Renill
0
Comment
Question by:renill
4 Comments
 
LVL 38

Accepted Solution

by:
Rich Rumble earned 500 total points
ID: 21778124
0
 
LVL 5

Author Comment

by:renill
ID: 21924112
please give 20% of the points to rich and redeem me the rest of the points.. i could find it in my own ways.

Thanks
renil
0

Featured Post

U.S. Department of Agriculture and Acronis Access

With the new era of mobile computing, smartphones and tablets, wireless communications and cloud services, the USDA sought to take advantage of a mobilized workforce and the blurring lines between personal and corporate computing resources.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
SSH over http/https 8 125
Win 7 PCs cant connect to RDS server , but Win 10 can 21 92
Penetration Testing home based work 3 76
PCI Compliance - mixing SAQs 6 32
Ensuring effective and secure communication in the age of healthcare BYOD.
This article will inform Clients about common and important expectations from the freelancers (Experts) who are looking at your Gig.
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…

832 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question